In which step does the threat actor use vulnerabilities of the assets that were discovered and builds them into a tool?
- exploitation
- delivery
- reconnaissance
- command and control
- weaponization
Explanation: In the weaponization stage, the threat actor uses vulnerabilities of the assets and builds a tool to exploit them.
Exam with this question: 28.2.9 Check Your Understanding - Identify the Kill Chain Step
Please login or Register to submit your answer